Deadlines
Submission of papers June 30, 2010 23:59:59 EST
Notification of Acceptance August 27th, 2010, 23:59:59 EST
Camera ready paper: September 10th, 2010: 23:59:59 EST
Conference dates: October 20-21, 2010
The 5th IEEE International Conference on Malicious and Unwanted
Software (Malware 2010) will be held in Nancy, France, Oct. 20-21,
2010. The conference is designed to bring together experts from
industry, academia, and government to present and discuss, in an open
environment, the latest advances and discoveries in the field of
malicious and unwanted software. Techniques, economics and legal
issues surrounding the topic of Malware, and the methods to detect and
control them will be discussed.
This year's conference will pay particular attention to (and will also
be extensively discussed in a panel session) the pressing topic of
"Malware and Cloud Computing". As low-cost Netbooks become popular,
Google's Chrome OS enters the mainstream, and social networks
(Facebook, YouTube, Twitter, LinkedIn, and so forth) become
ubiquitous, the security dangers associated with the new computing
paradigm increase exponentially. In effect, "Cloud Computing",
Multi-tenant, Single Schema, Single Server Platforms (C2S3P) increase
vulnerabilities by providing a single point of failure and attack for
organized criminal networks. Critical/sensitive/private information is
at risk, and very much like previous technology adoption trends, such
as wireless networks, the dash for success is trumping the need for
security.
Thus, the organizers of Malware 2010 solicit original written
contributions addressing these issues and research questions.
Manuscripts focusing on the security properties of Cloud Computing,
the risks associated with the deployment of such networks, and the
analysis of real incidents where a breach has occurred will be
particularly welcomed.
Submissions are solicited in, but not limited to, the following areas:
. Theoretical aspects and new directions on Malware related research
. Analysis and measurements of real malware incidents
. Worms, viruses and other propagating Malware
. Spyware, keystroke loggers, information theft Malware
. Honeypots and other sample collection methodologies
. Botnet attacks, detection/tracking and defense
. Malware economics and black market studies
. Code reverse engineering tools and practices
. Malware performance, analysis and capture tools
. Anti-spam and anti-phishing techniques and practices
. Legal aspects of unwanted software use
. Malware and its impact in social networking and cloud computing
. Rootkit and virtualization techniques
. Malware in wireless mobile devices
Publication:
The proceedings of the conference will be published in printed, and
DVD, form and will be included in the IEEE Xplore digital library. In
addition, the Conference's Technical Program Committee will select one
manuscript as a recipient of the "Best Paper Award". The Best Paper
Award author, together with the authors of a few selected manuscripts
from the conference, will be invited to submit an extended version to
a special issue of the Journal.
Paper Submission Information:
Papers should be submitted through EDAS system at:
Submitted manuscripts must be 10-point font size, and should not
exceed 8 single-spaced pages in length, including the abstract,
figures, and references. Authors whose manuscript exceeds the 8 page
limit may be allowed to include two additional pages for an extra
charge. However, under no circumstances shall a submitted manuscript
exceed the 10 page limit. Submitted papers must not substantially
overlap with papers that have been published or that are
simultaneously submitted to a journal or a conference with
proceedings.
Additional Information:
For more information on Malware 2010 or if you are interested in
contributing to the organization of the conference please contact Dr.
Fernando C. Colon Osorio, General Program Chair, Malware 2010 at
fcco@brandeis.edu or visit our web site www.malware2010.org. For
information concerning submission of an original manuscript to the
conference, please contact the Technical Program Committee Chairs
(TPC).
Malware 2010 Program Committee
General Program Chair:
Dr. Fernando C. Colon Osorio, WSSRL and Brandeis University, USA
Technical Program Committee Co-Chairs:
Prof. Jean-Yves Marion, Nancy Université, France, TPC
Mr. Noam Rathaus, Beyond Security, USA, TPC
Prof. Cliff Zhou, University Central Florida, USA, TPC
Technical Program Committee Members :
Mr. Anthony Arrott, Trends Micro, USA
Mr. Pierre-Marc Bureau, ESET, Canada
Dr. Mila Dalla Preda, Verona University, Italy
Prof. Saumya Debray, Arizona University, USA
Prof. Thomas Engel, University of Luxembourg, Luxembourg
Prof. José M. Fernandez, Ecole Polytechnique de Montréal, Canada
Dr. Olivier Festor, INRIA Nancy Grand-Est, France
Prof. Brent Kang, North Carolina University, USA
Prof. Felix Leder, Bonn Universtiy, Germany
Mr. Bo Olsen, Kaspersky, USA
Dr. Jose Nazario, Arbor networks, USA
Dr. Phil Porras, SRI International, USA
Dr. Fred Raynal, Sogeti, France
Prof. Andrew Walenstein, Lafayette University, USA
Mr. Jeff Williams, Microsoft, USA
Prof. Yang Xiang, Deakin University, Australia
Malware 2010 Keynote, Panels & Tutorials :
Mr. Jim Melvin, Vice President of Marketing & Security Solutions, RSA,
the Security Division of EMC, USA
Dr. Amit Sinha, Chief technology Officer, Air Defense Corporation, USA
Mr. Anthony Arrott, Trends Micro, USA
Malware 2010 Publicity Co-Chairs :
Prof. Jose Andres Morales, University of Texas, San Antonio, USA
Mr. Daniel Reynaud, Loria, France
Malware 2010 Local Chair :
Dr. Matthieu Kaczmarek, INRIA Nancy Grand-Est, France
--
Yours in Success,
Jose Andre Morales, Ph.D.
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment